SlideShare a Scribd company logo
Dominic WAI - When would using a computer be a crime?
When would using a computer be a
crime?
CFA narrowed the scope of
application of the
offence of accessing a computer
with dishonest intent
2
16 May 2019
Section 161 (1) (c) of
Crimes Ordinance (Cap. 200)
• 161 Access to computer with criminal or
dishonest intent
• (1) Any person who obtains access to a computer—
• (a) …
• (b) ...
• (c) with a view to dishonest gain for himself or
another; or
• (d) …
• whether on the same occasion as he obtains such
access or on any future occasion, commits an
offence and is liable on conviction upon indictment
to imprisonment for 5 years
3
Elements
• “obtain access” to
• a ”computer”
• with a view to “dishonest gain”
for himself or another
4
Definition of “Computer” - Secretary for Justice
v Wong Ka Yip Ken [2013] 4 HKLRD 604 (“Wong
Ka Yip Ken case”)
• No definition in the Crimes Ordinance (Cap 200)
• 2014: a man set his smartphone to record a video in
the ladies’ washroom of his office
• found guilty of the section 161 offence
• Court of First Instance considered the definition of
“computer”
• held that the dictionary meaning of “computer” as
“a device for electronic data storage, processing
and retrieval” included smartphone
• Definition of “obtain access” not discussed
5
Excessive usage of the offence
• Police have invoked section 161 for:
• online fraud
• illegal intrusion into computer systems
• clandestine photo-taking using
smartphones in such non-public places as
toilets or changing rooms
• online publication of obscene or
threatening information
• inciting others on the Internet to engage in
illegal acts
6
Excessive usage of the offence (Cont’d)
• 1999:  a technical assistant at Queen Mary Hospital, retrieved
the medical records of the then-Secretary for Justice, Elsie
Leung, and share them with his friends, family, and the media,
•  found guilty of the section 161 offence
• 2014: a man posted on the popular HKGolden forum, calling
for protesters to “paralyse the railway system by gathering on
railway platforms in an attempt to create chaos” during the
pro-democracy Occupy protests
• arrested under the section 161 charge
• 2016: a 22-year-old man posted erotic writing involving rape
• arrested on suspicion of the section 161 charge
7
Definition of “obtain access” - Secretary for
Justice v Cheng Ka-Yee and others (“Cheng Ka
Yee case”)
• Three teachers in a primary school (the “Primary
School”) and a teacher in another primary school (the
“Four”)
• used mobile smartphones and a school’s computer to
leak pictures and copies of the questions of the
admission interview of the Primary School
• charged with s.161(1)(c) of the Crimes Ordinance:
“obtain access to a computer with dishonest or
criminal intent”
8
Cheng Ka-Yee case– Magistrates’ Court’s ruling
• 2016: acquitted by Kowloon City Magistrates’ Court:
• Element: with a view to “dishonest gain”
• not sure if the three who worked in the Primary School
were warned of the confidentiality obligations with
respect to the questions of the admission interview
• prosecution failed to prove the objective limb of the
Ghosh test on “honesty” against the Four
• review application by the prosecution: Magistrate confirmed
decision to acquit
9
Cheng Ka-Yee case– Court of First Instance
[2018] HKCFI 1809
• Element: “obtain access”
• Deputy High Court Judge Pang Chung-ping:
• Considered the definition of “obtain access”
• Refused to convict the Four
10
Cheng Ka-Yee case– Court of First Instance
[2018] HKCFI 1809
• Deputy High Court Judge Pang Chung-ping (Cont’d):
• Prosecution’s legal position that whether or not a person
should be punished depends on the type of devices that the
person used to communicate cannot be reasonably
explained
• The use of communication device was only peripheral to the
criminal or dishonest plan, which could be achieved with or
without the communication device
• using a person’s own mobile smartphones, or use of
computer which is not unauthorized, to leak questions did
not amount to “obtaining access to computer”
11
Cheng Ka-Yee case – Court of First Instance
[2018] HKCFI 1809 (Cont’d)
• Deputy High Court Judge Pang Chung-ping (Cont’d):
• drew a difference between “obtaining access to a
computer” and “using a computer”
• does not support the contention that “obtaining access to
computer” includes using a person’s own smartphone to
communicate, to take photographs or to send messages
• To prove actus reus (the criminal act), the prosecution
must prove “the unauthorized extraction and use of
information” from a computer
12
Cheng Ka-Yee case – Court of Final Appeal
[2019] HKCFA 9
• Department of Justice appealed CFI’s decision
• CFA unanimously dismissed the appeal
• upheld the CFI’s decision that the s.161(1)(c) Charge should
not apply to a person’s own computer when it did not
involve access to another’s computer
13
Cheng Ka-Yee case – Court of Final Appeal
[2019] HKCFA 9 (Cont’d)
• Mr. Justice French NPJ decided (agreed by CJ Ma, Ribeiro
PJ, Fok PJ, Cheung PJ), inter alia:
• as a matter of language, one always “obtain” access to
something to which one did not have access before
• the statutory language is a bit redundant as the verb
“obtain” is a synonym for “access” when used as a verb
• the overlap emphasizes the oddness of applying the
s.161(1)(c) Charge to the use by a person of their own
computer
14
Cheng Ka-Yee case – Court of Final Appeal
[2019] HKCFA 9 (Cont’d)
• Mr. Justice French NPJ decided (agreed by CJ Ma, Ribeiro
PJ, Fok PJ, Cheung PJ), inter alia (Cont’d):
• during the legislative history, the interpretive provision “a
person obtains access to a computer if (and only if) he
causes a computer to perform any function” was deleted;
• the words “(obtaining access) with or without authority” did
not appear in the bill either;
• s.161(1)(c) Charge does not apply to the use by a person
of his or her own computer, not involving access to
another’s computer
15
Cheng Ka-Yee case – Court of Final Appeal
[2019] HKCFA 9 (Cont’d)
• Mr. Justice French NPJ (agreed by CJ Ma, Ribeiro PJ, Fok
PJ, Cheung PJ):
• it is not the function of the Court to adopt a construction
of a statute that advance a desirable public policy;
• the Court seeks to ascertain the purpose of the statute
to inform its construction;
• the Court does not identify a purpose which it thinks
would be beneficial and then construe the statute to fit it
16
What if Wong Ka Yip Ken case is decided after
CFA judgment in Cheng Ka Yee case?
• Facts: A man set his own smartphone to record a video in
the ladies’ washroom of his office
• Analysis: using his own smartphone device to record the
video
• using own device, and it did not involve access to another’s
computer
•  would not satisfy the definition of “obtaining access”
• Cannot prosecute under s.161 of Crimes Ordinance (Cap.
200)
17
What if Wong Ka Yip Ken case is decided after
CFA judgment in Cheng Ka Yee case? (Cont’d)
• Possible alternative charges?
• (1) Outraging public decency? (common law offence)
• may not apply
• Elements:
• “capable of being seen by two or more persons
who are actually present” AND
• “in a place where there was a real possibility that
members of the general public might witness it”
• difficult to prove
18
What if Wong Ka Yip Ken case is decided after
CFA judgment in Cheng Ka Yee case? (Cont’d)
• Possible alternative charges? (Cont’d)
• (2) Disorder in public places? (s.17B, Public Order Ordinance,
Cap. 245)
• may not apply
• Elements:
• act was done in public place
• the victim is put in fear of being so harmed through the
disturbance, and
• an average Hong Kong citizen is likely to be outraged by
such conduct
• female toilet of the company is unlikely a “public place”
19
What if Wong Ka Yip Ken case is decided after
CFA judgment in Cheng Ka Yee case? (Cont’d)
• Possible alternative charges? (Cont’d)
• (3) Loitering causing concern ? (s. 160 Crimes Ordinance, Cap. 200)
• may or may not apply
• Elements:
• offender has been idling, hanging about or remaining
• in or about the vicinity of the common parts of a building
(entrance hall, lobby, toilet, compound, car park, etc.)
• causes any person reasonably to be concerned for his/her
safety or well-being
• depends on whether the female toilet of the company is
considered as a “common part of a building”
• E.g.: whether the toilet is in common use by occupiers of building
20
What if Wong Ka Yip Ken case is decided after
CFA judgment in Cheng Ka Yee case? (Cont’d)
• May 2018: Law Reform Commission’s Review of Sexual
Offences Subcommittee
• proposed the creation of a new offence of “voyeurism” to
criminalise acts of non-consensual observation or visual
recording of another person done for a sexual purpose
• forms of visual recording would include photography, video
recording and the taking of digital images
• The prosecution in Wong Ka Yip Ken case may have to rely on
the proposed new offence of “voyeurism”
21
22

More Related Content

PDF
Computer Crime Law in Hong Kong
DOCX
FilmingThePolice
PPTX
Cyber defamtion
PDF
File000161
PDF
File000165
PPTX
Internet decency legislation
PPTX
Online defamation through social media an attempt to reconcile conflicts bet...
PDF
Darren Chaker Computer Search Warrant
Computer Crime Law in Hong Kong
FilmingThePolice
Cyber defamtion
File000161
File000165
Internet decency legislation
Online defamation through social media an attempt to reconcile conflicts bet...
Darren Chaker Computer Search Warrant

What's hot (20)

PDF
File000157
DOC
Internet policy[1]
PPTX
Cybersex law
PPT
Elet5e ch04
PPTX
Internet filtering in schools
PDF
Privacy and the Law in the Oversharing Era
PPT
CYBER BULLYING THE COURT’S ROLE
PDF
Perspectivesmanage
PPTX
communication decency act
PDF
Internet decency legislation
DOCX
Right to privacy in India
PPT
LWB486 Week 6 Copyright
PDF
The Latest Developments in Computer Crime Law
PDF
Public-Employee Privacy Rights in the Age of Social Media
PDF
File000098
PPT
Cybercrime
PPT
Copyright Scenario Cases
PDF
Revamping the Computer Fraud and Abuse Act
DOC
Jailbreaking OK'd by Librarian
PPT
Privacy in a Human Rights and Social Justice Context
File000157
Internet policy[1]
Cybersex law
Elet5e ch04
Internet filtering in schools
Privacy and the Law in the Oversharing Era
CYBER BULLYING THE COURT’S ROLE
Perspectivesmanage
communication decency act
Internet decency legislation
Right to privacy in India
LWB486 Week 6 Copyright
The Latest Developments in Computer Crime Law
Public-Employee Privacy Rights in the Age of Social Media
File000098
Cybercrime
Copyright Scenario Cases
Revamping the Computer Fraud and Abuse Act
Jailbreaking OK'd by Librarian
Privacy in a Human Rights and Social Justice Context
Ad

Similar to Dominic WAI - When would using a computer be a crime? (20)

PPT
Computer misuse act new 13 12-11
PPTX
Unit 3 Cyber Crimes and Torts 8 hr
PPT
Computer Misuse Act
PDF
The Law and Aaron Swartz: Could it happen in Singapore?
PPTX
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PDF
Cyber law
PPT
15998595.ppt
PPT
Digital Crime – Substantive Criminal Law – General Conditions – Offenses – In...
PDF
Cyber law
DOCX
Cyber law01
PDF
International Cybercrime (Part 2)
PPTX
upload a required Computer Misuse.pptx
PDF
Information technology Act with Cyber offences .pptx
PDF
Cyber Security Attacks - Critical Legal and Investigation Aspects
PDF
Existing Sri Lankan Legal Framework on Cyber Crimes
PPTX
Cyber law assignment
DOCX
Prashant and team cyber law
DOCX
Prashant and team cyber law
DOCX
Shilpa
DOCX
Cyber law cases and sections (1)
Computer misuse act new 13 12-11
Unit 3 Cyber Crimes and Torts 8 hr
Computer Misuse Act
The Law and Aaron Swartz: Could it happen in Singapore?
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
Cyber law
15998595.ppt
Digital Crime – Substantive Criminal Law – General Conditions – Offenses – In...
Cyber law
Cyber law01
International Cybercrime (Part 2)
upload a required Computer Misuse.pptx
Information technology Act with Cyber offences .pptx
Cyber Security Attacks - Critical Legal and Investigation Aspects
Existing Sri Lankan Legal Framework on Cyber Crimes
Cyber law assignment
Prashant and team cyber law
Prashant and team cyber law
Shilpa
Cyber law cases and sections (1)
Ad

More from REVULN (12)

PDF
Yono REKSOPRODJO, Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
PDF
Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...
PDF
Isao MATSUNAMI - Digital security in japanese journalism
PDF
Chung-Jui LAI - Polarization of Political Opinion by News Media
PDF
Stewart MACKENZIE - The edge of the Internet is becoming the center
PDF
Masayuki HATTA - Debunking toxic "Matome sites" in Japan
PDF
Sebastien BOURDEAUDUCQ, Stewart MACKENZIE - A talk about nothing (How to crea...
PDF
Rachel BLUNDY - Overview of AFP Fact Check
PDF
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
PDF
Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and imp...
PDF
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
PDF
Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...
Yono REKSOPRODJO, Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...
Isao MATSUNAMI - Digital security in japanese journalism
Chung-Jui LAI - Polarization of Political Opinion by News Media
Stewart MACKENZIE - The edge of the Internet is becoming the center
Masayuki HATTA - Debunking toxic "Matome sites" in Japan
Sebastien BOURDEAUDUCQ, Stewart MACKENZIE - A talk about nothing (How to crea...
Rachel BLUNDY - Overview of AFP Fact Check
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and imp...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...

Recently uploaded (20)

PPTX
Learning-Plan-4-Core-Principles.pptx htts
PPTX
RULE_4_Out_of_Court_or_Informal_Restructuring_Agreement_or_Rehabilitation.pptx
PDF
The AI & LegalTech Surge Reshaping the Indian Legal Landscape
PDF
APPELLANT'S AMENDED BRIEF – DPW ENTERPRISES LLC & MOUNTAIN PRIME 2018 LLC v. ...
PPTX
Income under income Tax Act..pptx Introduction
PDF
The Advocate, Vol. 34 No. 1 Fall 2024
PPTX
BUSINESS LAW AND IT IN CONTRACT SIGNING AND MANAGEMENT
PDF
250811-FINAL-Bihar_Voter_Deletion_Analysis_Presentation.pdf
PPTX
Law of Torts , unit I for BA.LLB integrated course
PDF
algor mortis or cooling of body after death THANATOLOGY
PPTX
Lecture Notes on Family Law - Knowledge Area 5
PDF
Louisiana Bar Foundation 2023-2024 Annual Report
PDF
New York State Bar Association Journal, September 2014
PPT
looking_into_the_crystal_ball - Merger Control .ppt
PPTX
Ethiopian Law of Contract short note.pptx
PDF
Trademark, Copyright, and Trade Secret Protection for Med Tech Startups.pdf
PPT
Understanding the Impact of the Cyber Act
PPTX
FFFFFFFFFFFFFFFFFFFFFFTA_012425_PPT.pptx
PPTX
ART OF LEGAL WRITING IN THE CBD [Autosaved].pptx
PDF
Vinayaka Mission Law School Courses and Infrastructure.pdf
Learning-Plan-4-Core-Principles.pptx htts
RULE_4_Out_of_Court_or_Informal_Restructuring_Agreement_or_Rehabilitation.pptx
The AI & LegalTech Surge Reshaping the Indian Legal Landscape
APPELLANT'S AMENDED BRIEF – DPW ENTERPRISES LLC & MOUNTAIN PRIME 2018 LLC v. ...
Income under income Tax Act..pptx Introduction
The Advocate, Vol. 34 No. 1 Fall 2024
BUSINESS LAW AND IT IN CONTRACT SIGNING AND MANAGEMENT
250811-FINAL-Bihar_Voter_Deletion_Analysis_Presentation.pdf
Law of Torts , unit I for BA.LLB integrated course
algor mortis or cooling of body after death THANATOLOGY
Lecture Notes on Family Law - Knowledge Area 5
Louisiana Bar Foundation 2023-2024 Annual Report
New York State Bar Association Journal, September 2014
looking_into_the_crystal_ball - Merger Control .ppt
Ethiopian Law of Contract short note.pptx
Trademark, Copyright, and Trade Secret Protection for Med Tech Startups.pdf
Understanding the Impact of the Cyber Act
FFFFFFFFFFFFFFFFFFFFFFTA_012425_PPT.pptx
ART OF LEGAL WRITING IN THE CBD [Autosaved].pptx
Vinayaka Mission Law School Courses and Infrastructure.pdf

Dominic WAI - When would using a computer be a crime?

  • 2. When would using a computer be a crime? CFA narrowed the scope of application of the offence of accessing a computer with dishonest intent 2 16 May 2019
  • 3. Section 161 (1) (c) of Crimes Ordinance (Cap. 200) • 161 Access to computer with criminal or dishonest intent • (1) Any person who obtains access to a computer— • (a) … • (b) ... • (c) with a view to dishonest gain for himself or another; or • (d) … • whether on the same occasion as he obtains such access or on any future occasion, commits an offence and is liable on conviction upon indictment to imprisonment for 5 years 3
  • 4. Elements • “obtain access” to • a ”computer” • with a view to “dishonest gain” for himself or another 4
  • 5. Definition of “Computer” - Secretary for Justice v Wong Ka Yip Ken [2013] 4 HKLRD 604 (“Wong Ka Yip Ken case”) • No definition in the Crimes Ordinance (Cap 200) • 2014: a man set his smartphone to record a video in the ladies’ washroom of his office • found guilty of the section 161 offence • Court of First Instance considered the definition of “computer” • held that the dictionary meaning of “computer” as “a device for electronic data storage, processing and retrieval” included smartphone • Definition of “obtain access” not discussed 5
  • 6. Excessive usage of the offence • Police have invoked section 161 for: • online fraud • illegal intrusion into computer systems • clandestine photo-taking using smartphones in such non-public places as toilets or changing rooms • online publication of obscene or threatening information • inciting others on the Internet to engage in illegal acts 6
  • 7. Excessive usage of the offence (Cont’d) • 1999:  a technical assistant at Queen Mary Hospital, retrieved the medical records of the then-Secretary for Justice, Elsie Leung, and share them with his friends, family, and the media, •  found guilty of the section 161 offence • 2014: a man posted on the popular HKGolden forum, calling for protesters to “paralyse the railway system by gathering on railway platforms in an attempt to create chaos” during the pro-democracy Occupy protests • arrested under the section 161 charge • 2016: a 22-year-old man posted erotic writing involving rape • arrested on suspicion of the section 161 charge 7
  • 8. Definition of “obtain access” - Secretary for Justice v Cheng Ka-Yee and others (“Cheng Ka Yee case”) • Three teachers in a primary school (the “Primary School”) and a teacher in another primary school (the “Four”) • used mobile smartphones and a school’s computer to leak pictures and copies of the questions of the admission interview of the Primary School • charged with s.161(1)(c) of the Crimes Ordinance: “obtain access to a computer with dishonest or criminal intent” 8
  • 9. Cheng Ka-Yee case– Magistrates’ Court’s ruling • 2016: acquitted by Kowloon City Magistrates’ Court: • Element: with a view to “dishonest gain” • not sure if the three who worked in the Primary School were warned of the confidentiality obligations with respect to the questions of the admission interview • prosecution failed to prove the objective limb of the Ghosh test on “honesty” against the Four • review application by the prosecution: Magistrate confirmed decision to acquit 9
  • 10. Cheng Ka-Yee case– Court of First Instance [2018] HKCFI 1809 • Element: “obtain access” • Deputy High Court Judge Pang Chung-ping: • Considered the definition of “obtain access” • Refused to convict the Four 10
  • 11. Cheng Ka-Yee case– Court of First Instance [2018] HKCFI 1809 • Deputy High Court Judge Pang Chung-ping (Cont’d): • Prosecution’s legal position that whether or not a person should be punished depends on the type of devices that the person used to communicate cannot be reasonably explained • The use of communication device was only peripheral to the criminal or dishonest plan, which could be achieved with or without the communication device • using a person’s own mobile smartphones, or use of computer which is not unauthorized, to leak questions did not amount to “obtaining access to computer” 11
  • 12. Cheng Ka-Yee case – Court of First Instance [2018] HKCFI 1809 (Cont’d) • Deputy High Court Judge Pang Chung-ping (Cont’d): • drew a difference between “obtaining access to a computer” and “using a computer” • does not support the contention that “obtaining access to computer” includes using a person’s own smartphone to communicate, to take photographs or to send messages • To prove actus reus (the criminal act), the prosecution must prove “the unauthorized extraction and use of information” from a computer 12
  • 13. Cheng Ka-Yee case – Court of Final Appeal [2019] HKCFA 9 • Department of Justice appealed CFI’s decision • CFA unanimously dismissed the appeal • upheld the CFI’s decision that the s.161(1)(c) Charge should not apply to a person’s own computer when it did not involve access to another’s computer 13
  • 14. Cheng Ka-Yee case – Court of Final Appeal [2019] HKCFA 9 (Cont’d) • Mr. Justice French NPJ decided (agreed by CJ Ma, Ribeiro PJ, Fok PJ, Cheung PJ), inter alia: • as a matter of language, one always “obtain” access to something to which one did not have access before • the statutory language is a bit redundant as the verb “obtain” is a synonym for “access” when used as a verb • the overlap emphasizes the oddness of applying the s.161(1)(c) Charge to the use by a person of their own computer 14
  • 15. Cheng Ka-Yee case – Court of Final Appeal [2019] HKCFA 9 (Cont’d) • Mr. Justice French NPJ decided (agreed by CJ Ma, Ribeiro PJ, Fok PJ, Cheung PJ), inter alia (Cont’d): • during the legislative history, the interpretive provision “a person obtains access to a computer if (and only if) he causes a computer to perform any function” was deleted; • the words “(obtaining access) with or without authority” did not appear in the bill either; • s.161(1)(c) Charge does not apply to the use by a person of his or her own computer, not involving access to another’s computer 15
  • 16. Cheng Ka-Yee case – Court of Final Appeal [2019] HKCFA 9 (Cont’d) • Mr. Justice French NPJ (agreed by CJ Ma, Ribeiro PJ, Fok PJ, Cheung PJ): • it is not the function of the Court to adopt a construction of a statute that advance a desirable public policy; • the Court seeks to ascertain the purpose of the statute to inform its construction; • the Court does not identify a purpose which it thinks would be beneficial and then construe the statute to fit it 16
  • 17. What if Wong Ka Yip Ken case is decided after CFA judgment in Cheng Ka Yee case? • Facts: A man set his own smartphone to record a video in the ladies’ washroom of his office • Analysis: using his own smartphone device to record the video • using own device, and it did not involve access to another’s computer •  would not satisfy the definition of “obtaining access” • Cannot prosecute under s.161 of Crimes Ordinance (Cap. 200) 17
  • 18. What if Wong Ka Yip Ken case is decided after CFA judgment in Cheng Ka Yee case? (Cont’d) • Possible alternative charges? • (1) Outraging public decency? (common law offence) • may not apply • Elements: • “capable of being seen by two or more persons who are actually present” AND • “in a place where there was a real possibility that members of the general public might witness it” • difficult to prove 18
  • 19. What if Wong Ka Yip Ken case is decided after CFA judgment in Cheng Ka Yee case? (Cont’d) • Possible alternative charges? (Cont’d) • (2) Disorder in public places? (s.17B, Public Order Ordinance, Cap. 245) • may not apply • Elements: • act was done in public place • the victim is put in fear of being so harmed through the disturbance, and • an average Hong Kong citizen is likely to be outraged by such conduct • female toilet of the company is unlikely a “public place” 19
  • 20. What if Wong Ka Yip Ken case is decided after CFA judgment in Cheng Ka Yee case? (Cont’d) • Possible alternative charges? (Cont’d) • (3) Loitering causing concern ? (s. 160 Crimes Ordinance, Cap. 200) • may or may not apply • Elements: • offender has been idling, hanging about or remaining • in or about the vicinity of the common parts of a building (entrance hall, lobby, toilet, compound, car park, etc.) • causes any person reasonably to be concerned for his/her safety or well-being • depends on whether the female toilet of the company is considered as a “common part of a building” • E.g.: whether the toilet is in common use by occupiers of building 20
  • 21. What if Wong Ka Yip Ken case is decided after CFA judgment in Cheng Ka Yee case? (Cont’d) • May 2018: Law Reform Commission’s Review of Sexual Offences Subcommittee • proposed the creation of a new offence of “voyeurism” to criminalise acts of non-consensual observation or visual recording of another person done for a sexual purpose • forms of visual recording would include photography, video recording and the taking of digital images • The prosecution in Wong Ka Yip Ken case may have to rely on the proposed new offence of “voyeurism” 21
  • 22. 22